TorBT - Torrents and Magnet Links Search Engine

Udemy - Da 0 ad Ethical Hacker - Parte 2 [Ita]

File Name
Size
09 HTB Machine/001 Late_it.srt
0 B
04 Vulnerability Assessment/007 Identification and Bypassing Firewall Nmap (Introduction).mp4
246 MB
01 Introduzione/001 Introduzione.srt
695 B
01 Introduzione/001 Introduzione_it.srt
688 B
02 Anonimato/001 Anonimato con Proxychain - Teoria.mp4
54 MB
02 Anonimato/001 Anonimato con Proxychain - Teoria.srt
5.8 kB
02 Anonimato/001 Anonimato con Proxychain - Teoria_it.srt
6.2 kB
02 Anonimato/002 Proxychain.mp4
212 MB
02 Anonimato/002 Proxychain.srt
15 kB
02 Anonimato/002 Proxychain_it.srt
16 kB
03 FootPrinting - OSINT/001 Footprinting - Teoria.mp4
88 MB
03 FootPrinting - OSINT/001 Footprinting - Teoria.srt
7.1 kB
03 FootPrinting - OSINT/001 Footprinting - Teoria_it.srt
7.5 kB
03 FootPrinting - OSINT/002 Google Hacking.mp4
99 MB
03 FootPrinting - OSINT/002 Google Hacking.srt
11 kB
03 FootPrinting - OSINT/002 Google Hacking_it.srt
12 kB
03 FootPrinting - OSINT/003 Intelligence X.mp4
80 MB
03 FootPrinting - OSINT/003 Intelligence X.srt
9.6 kB
03 FootPrinting - OSINT/003 Intelligence X_it.srt
10 kB
03 FootPrinting - OSINT/004 SpiderFoot.mp4
117 MB
03 FootPrinting - OSINT/004 SpiderFoot.srt
11 kB
03 FootPrinting - OSINT/004 SpiderFoot_it.srt
12 kB
03 FootPrinting - OSINT/005 MassScan.mp4
160 MB
03 FootPrinting - OSINT/005 MassScan.srt
12 kB
03 FootPrinting - OSINT/005 MassScan_it.srt
13 kB
04 Vulnerability Assessment/001 VA - Teoria.mp4
83 MB
04 Vulnerability Assessment/001 VA - Teoria.srt
5.9 kB
04 Vulnerability Assessment/001 VA - Teoria_it.srt
6.3 kB
04 Vulnerability Assessment/002 Nessus - Installazione e Configurazione.mp4
118 MB
04 Vulnerability Assessment/002 Nessus - Installazione e Configurazione.srt
13 kB
04 Vulnerability Assessment/002 Nessus - Installazione e Configurazione_it.srt
14 kB
04 Vulnerability Assessment/003 Nessus - Lancio di una scansione.mp4
70 MB
04 Vulnerability Assessment/003 Nessus - Lancio di una scansione.srt
9.2 kB
04 Vulnerability Assessment/003 Nessus - Lancio di una scansione_it.srt
9.8 kB
04 Vulnerability Assessment/004 Nessus - Analisi risultati.mp4
66 MB
04 Vulnerability Assessment/004 Nessus - Analisi risultati.srt
9.0 kB
04 Vulnerability Assessment/004 Nessus - Analisi risultati_it.srt
9.5 kB
04 Vulnerability Assessment/005 Nessus - Report.mp4
116 MB
04 Vulnerability Assessment/005 Nessus - Report.srt
11 kB
04 Vulnerability Assessment/005 Nessus - Report_it.srt
12 kB
04 Vulnerability Assessment/006 Nmap Vulners.mp4
154 MB
04 Vulnerability Assessment/006 Nmap Vulners.srt
12 kB
04 Vulnerability Assessment/006 Nmap Vulners_it.srt
12 kB
01 Introduzione/001 Introduzione.mp4
12 MB
04 Vulnerability Assessment/007 Identification and Bypassing Firewall Nmap (Introduction).srt
15 kB
04 Vulnerability Assessment/007 Identification and Bypassing Firewall Nmap (Introduction)_it.srt
16 kB
04 Vulnerability Assessment/008 JSafe Scanner.mp4
90 MB
04 Vulnerability Assessment/008 JSafe Scanner.srt
12 kB
04 Vulnerability Assessment/008 JSafe Scanner_it.srt
13 kB
04 Vulnerability Assessment/009 WP Scan.mp4
98 MB
04 Vulnerability Assessment/009 WP Scan.srt
9.2 kB
04 Vulnerability Assessment/009 WP Scan_it.srt
9.7 kB
05 WAPT - Burp Accademy/001 File Path Traversal.mp4
52 MB
05 WAPT - Burp Accademy/001 File Path Traversal.srt
6.6 kB
05 WAPT - Burp Accademy/001 File Path Traversal_it.srt
7.0 kB
05 WAPT - Burp Accademy/002 File Path Traversal - Example 1.mp4
52 MB
05 WAPT - Burp Accademy/002 File Path Traversal - Example 1.srt
6.2 kB
05 WAPT - Burp Accademy/002 File Path Traversal - Example 1_it.srt
6.6 kB
05 WAPT - Burp Accademy/003 File Path Traversal - Example 2.mp4
29 MB
05 WAPT - Burp Accademy/003 File Path Traversal - Example 2_it.srt
3.5 kB
05 WAPT - Burp Accademy/004 File Path Traversal - Example 3.mp4
21 MB
05 WAPT - Burp Accademy/004 File Path Traversal - Example 3_it.srt
2.6 kB
05 WAPT - Burp Accademy/005 File Path Traversal - Example 4.mp4
25 MB
05 WAPT - Burp Accademy/005 File Path Traversal - Example 4_it.srt
3.4 kB
05 WAPT - Burp Accademy/006 File Path Traversal - Example 5.mp4
25 MB
05 WAPT - Burp Accademy/006 File Path Traversal - Example 5_it.srt
2.5 kB
05 WAPT - Burp Accademy/007 File Path Traversal - Example 6.mp4
28 MB
05 WAPT - Burp Accademy/007 File Path Traversal - Example 6_it.srt
3.4 kB
05 WAPT - Burp Accademy/008 Prevent Directory Traversal.mp4
26 MB
05 WAPT - Burp Accademy/008 Prevent Directory Traversal_it.srt
2.9 kB
05 WAPT - Burp Accademy/009 File Upload Vulnerabilities.mp4
39 MB
05 WAPT - Burp Accademy/009 File Upload Vulnerabilities_it.srt
3.5 kB
05 WAPT - Burp Accademy/010 File Upload Vulnerabilities - Example 1.mp4
48 MB
05 WAPT - Burp Accademy/010 File Upload Vulnerabilities - Example 1_it.srt
7.2 kB
05 WAPT - Burp Accademy/011 File Upload Vulnerabilities - Example 2.mp4
37 MB
05 WAPT - Burp Accademy/011 File Upload Vulnerabilities - Example 2_it.srt
4.9 kB
05 WAPT - Burp Accademy/012 File Upload Vulnerabilities - Example 3.mp4
45 MB
05 WAPT - Burp Accademy/012 File Upload Vulnerabilities - Example 3_it.srt
6.2 kB
05 WAPT - Burp Accademy/013 File Upload Vulnerabilities - Example 4.mp4
41 MB
05 WAPT - Burp Accademy/013 File Upload Vulnerabilities - Example 4_it.srt
5.1 kB
05 WAPT - Burp Accademy/014 File Upload Vulnerabilities - Example 5.mp4
50 MB
05 WAPT - Burp Accademy/014 File Upload Vulnerabilities - Example 5_it.srt
6.6 kB
05 WAPT - Burp Accademy/015 File Upload Vulnerabilities - Prevention.mp4
27 MB
05 WAPT - Burp Accademy/015 File Upload Vulnerabilities - Prevention_it.srt
3.3 kB
05 WAPT - Burp Accademy/016 Os Command Injection.mp4
36 MB
05 WAPT - Burp Accademy/016 Os Command Injection_it.srt
4.2 kB
05 WAPT - Burp Accademy/017 Os Command Injection - Example 1.mp4
45 MB
05 WAPT - Burp Accademy/017 Os Command Injection - Example 1_it.srt
7.2 kB
05 WAPT - Burp Accademy/018 Os Command Injection - Example 2.mp4
34 MB
05 WAPT - Burp Accademy/018 Os Command Injection - Example 2_it.srt
5.2 kB
05 WAPT - Burp Accademy/019 Os Command Injection - Example 3.mp4
37 MB
05 WAPT - Burp Accademy/019 Os Command Injection - Example 3_it.srt
5.1 kB
05 WAPT - Burp Accademy/020 Information Disclosure.mp4
24 MB
05 WAPT - Burp Accademy/020 Information Disclosure_it.srt
2.1 kB
05 WAPT - Burp Accademy/021 Information Disclosure - Example 1.mp4
26 MB
05 WAPT - Burp Accademy/021 Information Disclosure - Example 1_it.srt
2.7 kB
05 WAPT - Burp Accademy/022 Information Disclosure - Example 2.mp4
35 MB
05 WAPT - Burp Accademy/022 Information Disclosure - Example 2_it.srt
3.2 kB
05 WAPT - Burp Accademy/023 Information Disclosure - Example 3.mp4
28 MB
05 WAPT - Burp Accademy/023 Information Disclosure - Example 3_it.srt
3.5 kB
05 WAPT - Burp Accademy/024 Information Disclosure - Example 4.mp4
61 MB
05 WAPT - Burp Accademy/024 Information Disclosure - Example 4_it.srt
9.8 kB
05 WAPT - Burp Accademy/025 SSRF - Server Side Request Forgery.mp4
45 MB
05 WAPT - Burp Accademy/025 SSRF - Server Side Request Forgery_it.srt
5.6 kB
05 WAPT - Burp Accademy/026 SSRF - Server Side Request Forgery - Example 1.mp4
60 MB
05 WAPT - Burp Accademy/026 SSRF - Server Side Request Forgery - Example 1_it.srt
6.8 kB
05 WAPT - Burp Accademy/027 SSRF - Server Side Request Forgery - Example 2.mp4
75 MB
05 WAPT - Burp Accademy/027 SSRF - Server Side Request Forgery - Example 2_it.srt
8.6 kB
05 WAPT - Burp Accademy/028 XXE - Xml External Entity.mp4
30 MB
05 WAPT - Burp Accademy/028 XXE - Xml External Entity_it.srt
3.7 kB
05 WAPT - Burp Accademy/029 XXE - Xml External Entity - Example 1.mp4
34 MB
05 WAPT - Burp Accademy/029 XXE - Xml External Entity - Example 1_it.srt
3.1 kB
05 WAPT - Burp Accademy/030 XXE - Xml External Entity - Example 2.mp4
52 MB
05 WAPT - Burp Accademy/030 XXE - Xml External Entity - Example 2_it.srt
5.0 kB
05 WAPT - Burp Accademy/031 XXE - Xml External Entity - Example 3.mp4
40 MB
05 WAPT - Burp Accademy/031 XXE - Xml External Entity - Example 3_it.srt
3.9 kB
05 WAPT - Burp Accademy/032 XXE - Xml External Entity - Example 4.mp4
32 MB
05 WAPT - Burp Accademy/032 XXE - Xml External Entity - Example 4_it.srt
4.5 kB
05 WAPT - Burp Accademy/033 SSTI - Server Side Template Injection.mp4
56 MB
05 WAPT - Burp Accademy/033 SSTI - Server Side Template Injection_it.srt
5.7 kB
05 WAPT - Burp Accademy/034 SSTI - Server Side Template Injection - Example 1.mp4
70 MB
05 WAPT - Burp Accademy/034 SSTI - Server Side Template Injection - Example 1_it.srt
8.1 kB
05 WAPT - Burp Accademy/035 SSTI - Server Side Template Injection - Example 2.mp4
74 MB
05 WAPT - Burp Accademy/035 SSTI - Server Side Template Injection - Example 2_it.srt
10 kB
06 Cracking Password/001 Password Cracking - Teoria.mp4
129 MB
06 Cracking Password/001 Password Cracking - Teoria_it.srt
13 kB
06 Cracking Password/002 John The Ripper.mp4
58 MB
06 Cracking Password/002 John The Ripper_it.srt
8.2 kB
06 Cracking Password/003 Hydra.mp4
69 MB
06 Cracking Password/003 Hydra_it.srt
8.0 kB
06 Cracking Password/004 Hashcat.mp4
129 MB
06 Cracking Password/004 Hashcat_it.srt
16 kB
06 Cracking Password/005 Raimbow Tables.mp4
73 MB
06 Cracking Password/005 Raimbow Tables_it.srt
7.6 kB
07 HoneyPot/001 HoneyPot - Teoria.mp4
66 MB
07 HoneyPot/001 HoneyPot - Teoria_it.srt
5.8 kB
07 HoneyPot/002 Honeypot SSHICMP (Esempio di Jhoneypot).mp4
48 MB
07 HoneyPot/002 Honeypot SSHICMP (Esempio di Jhoneypot)_it.srt
7.0 kB
08 HARDWARETELCO HACKING/001 Introduzione del dispositivo da testare (Hardware).mp4
59 MB
08 HARDWARETELCO HACKING/001 Introduzione del dispositivo da testare (Hardware)_it.srt
6.1 kB
08 HARDWARETELCO HACKING/002 Utilizzo del Multimetro.mp4
62 MB
08 HARDWARETELCO HACKING/002 Utilizzo del Multimetro_it.srt
4.9 kB
08 HARDWARETELCO HACKING/003 Logic Analyzer.mp4
176 MB
08 HARDWARETELCO HACKING/003 Logic Analyzer_it.srt
12 kB
08 HARDWARETELCO HACKING/004 BootLoader attraverso la UART.mp4
91 MB
08 HARDWARETELCO HACKING/004 BootLoader attraverso la UART_it.srt
7.3 kB
08 HARDWARETELCO HACKING/005 Dumping SPI - Parte 1.mp4
91 MB
08 HARDWARETELCO HACKING/005 Dumping SPI - Parte 1_it.srt
6.6 kB
08 HARDWARETELCO HACKING/006 Dumping SPI (Con presa dell'utente Root) - Parte 2.mp4
45 MB
08 HARDWARETELCO HACKING/006 Dumping SPI (Con presa dell'utente Root) - Parte 2_it.srt
5.1 kB
08 HARDWARETELCO HACKING/007 Flipper Zero - Intro and 125Khz attack.mp4
106 MB
08 HARDWARETELCO HACKING/007 Flipper Zero - Intro and 125Khz attack_it.srt
7.9 kB
08 HARDWARETELCO HACKING/008 Flipper Zero - Attack on NFC and SubGhz.mp4
60 MB
08 HARDWARETELCO HACKING/008 Flipper Zero - Attack on NFC and SubGhz_it.srt
3.4 kB
08 HARDWARETELCO HACKING/009 Flipper Zero - Bad USB and Infrared Attack.mp4
90 MB
08 HARDWARETELCO HACKING/009 Flipper Zero - Bad USB and Infrared Attack_it.srt
4.8 kB
09 HTB Machine/001 Late.mp4
203 MB
Read Me.txt
17 B
09 HTB Machine/002 Paper - WriteUp.html
220 B
10 Caso Reale/001 Vulnerabilità Log4J - Parte 1.mp4
155 MB
10 Caso Reale/001 Vulnerabilità Log4J - Parte 1_it.srt
13 kB
10 Caso Reale/002 Vulnerabilità Log4J - Parte 2.mp4
174 MB
10 Caso Reale/002 Vulnerabilità Log4J - Parte 2_it.srt
16 kB
10 Caso Reale/003 Vulnerabilità Log4J - Parte 3.mp4
133 MB
10 Caso Reale/003 Vulnerabilità Log4J - Parte 3_it.srt
11 kB